We may sometimes access data for things like email outreach, anonymized data processing, and aggregated, anonymized data analysis.<br> <br>We use recommended security protocols to encrypt all data, both in transit and at rest.<br> <br>The security of your data is of utmost importance to us. But remember: no method of data transmission over the internet or electronic storage method is 100% secure. We strive to use the latest recommended practices in data security, and we continually monitor digital security best practices to upgrade our services accordingly.